aboutsummaryrefslogtreecommitdiff
path: root/examples/python2.7/patches/disable-ssl-cert-tests.diff
blob: af3deab5f6eddb4850a6292e9e5b84e60b66e598 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
--- a/Lib/test/test_ssl.py
+++ b/Lib/test/test_ssl.py
@@ -231,59 +231,6 @@
             finally:
                 s.close()
 
-            # this should succeed because we specify the root cert
-            s = ssl.wrap_socket(socket.socket(socket.AF_INET),
-                                cert_reqs=ssl.CERT_REQUIRED,
-                                ca_certs=SVN_PYTHON_ORG_ROOT_CERT)
-            try:
-                s.connect(("svn.python.org", 443))
-            finally:
-                s.close()
-
-    def test_connect_ex(self):
-        # Issue #11326: check connect_ex() implementation
-        with test_support.transient_internet("svn.python.org"):
-            s = ssl.wrap_socket(socket.socket(socket.AF_INET),
-                                cert_reqs=ssl.CERT_REQUIRED,
-                                ca_certs=SVN_PYTHON_ORG_ROOT_CERT)
-            try:
-                self.assertEqual(0, s.connect_ex(("svn.python.org", 443)))
-                self.assertTrue(s.getpeercert())
-            finally:
-                s.close()
-
-    def test_non_blocking_connect_ex(self):
-        # Issue #11326: non-blocking connect_ex() should allow handshake
-        # to proceed after the socket gets ready.
-        with test_support.transient_internet("svn.python.org"):
-            s = ssl.wrap_socket(socket.socket(socket.AF_INET),
-                                cert_reqs=ssl.CERT_REQUIRED,
-                                ca_certs=SVN_PYTHON_ORG_ROOT_CERT,
-                                do_handshake_on_connect=False)
-            try:
-                s.setblocking(False)
-                rc = s.connect_ex(('svn.python.org', 443))
-                # EWOULDBLOCK under Windows, EINPROGRESS elsewhere
-                self.assertIn(rc, (0, errno.EINPROGRESS, errno.EWOULDBLOCK))
-                # Wait for connect to finish
-                select.select([], [s], [], 5.0)
-                # Non-blocking handshake
-                while True:
-                    try:
-                        s.do_handshake()
-                        break
-                    except ssl.SSLError as err:
-                        if err.args[0] == ssl.SSL_ERROR_WANT_READ:
-                            select.select([s], [], [], 5.0)
-                        elif err.args[0] == ssl.SSL_ERROR_WANT_WRITE:
-                            select.select([], [s], [], 5.0)
-                        else:
-                            raise
-                # SSL established
-                self.assertTrue(s.getpeercert())
-            finally:
-                s.close()
-
     @unittest.skipIf(os.name == "nt", "Can't use a socket as a file under Windows")
     def test_makefile_close(self):
         # Issue #5238: creating a file-like object with makefile() shouldn't
@@ -343,12 +290,6 @@
             else:
                 self.fail("Got server certificate %s for svn.python.org!" % pem)
 
-            pem = ssl.get_server_certificate(("svn.python.org", 443), ca_certs=SVN_PYTHON_ORG_ROOT_CERT)
-            if not pem:
-                self.fail("No server certificate on svn.python.org:443!")
-            if test_support.verbose:
-                sys.stdout.write("\nVerified certificate for svn.python.org:443 is\n%s\n" % pem)
-
     def test_algorithms(self):
         # Issue #8484: all algorithms should be available when verifying a
         # certificate.